Author: Admin

May 8, 2025Red LakshmananVulnerability / safety network Cisco has released software fixes to solve the lack of security maximum speed in the iOS XE wireless controller, which can allow the unauthorized, remote attackers to download arbitrary files into a sensitive system. Vulnerability tracked as Cve-2015-2018810.0 on CVSS assessment was estimated. “This vulnerability is related to the presence of a rigid coded token JSON (JWT) in the affected system,” the company – Note in consultation on Wednesday. “The attacker can use this vulnerability by sending HTTPS to the Image Loading Interface. Successful operation can allow the attacker to download files, make…

Read More

07 May 2025Red LakshmananVulnerability / safety online The second lack of security that affects Flow (Previously Suretriggers) WordPress plugin is actively operating in the wild. The vulnerability, which is tracked as CVE-2025-27007 (CVSS: 9.8) is an escalation of privileges that affect all versions of the plugin before and turn on version 1.0.82. “This is due to the Create_wp_connection () feature that is missing the possibility and insufficient to check the user authentication data,” – Wordfence – Note. “This allows the unauthorized attackers to establish a connection that can eventually make the escalation of privileges.” In view of this, vulnerability is…

Read More

07 May 2025Red LakshmananDark Network / Cybercrime Europol has announced the removal of distributed service refusal (DDOS) for the rental used to launch thousands of cyber-over the world. In connection with the operation, the Polish authorities arrested four people, and the US confiscated nine domains related to the already non -existent platforms. “It is assumed that the suspects stand for six separate STASSER/Booter services, which allowed customers to flood the sites and servers with harmful traffic – beating them offline in just 10 euros,” Europol – Note In a statement. The services named CFXAPI, CFXSECURITY, NESTRESS, JETSESS, QUICDown and ZAPCUT…

Read More

07 May 2025Hacker NewsBrowser security / business safety Edge Service Edge (SSE) platforms have become architecture to ensure hybrid work and access Saas. They promise centralized execution, simplified connection and consistent control over users and devices. But there is a problem: they stop from where the most sensitive user activity is the browser. This is not a small omission. This is a structural restriction. And this leaves the organizations that are exposed to one place, which they cannot afford: the last mile of user interaction. New Report Reassessing SSE: Technical Defense Analysis for the Last Miles Analysis of gaps in…

Read More

07 May 2025Red LakshmananVulnerability / IT -series Cybersecurity researchers have revealed several disadvantages of safety in the Sysaid IT Support software that can be used to achieve pre -proven remote code with high privileges. The vulnerabilities tracked as CVE-2025-275, CVE-2025-2776 and CVE-2025-2777 were described as the external essence of the XML (XXE) Injections that occur when the attacker is able to successfully interfere with the analysis of the XML app. This, in turn, can allow the attackers to introduce dangerous XML subjects into the web application, allowing them to make fake a server request (Ssrf) Attack and in the worst…

Read More

The actors threatened with the Ransomware Family shows exploit the recently fixed security lack of Microsoft Windows as a zero day as part of an attack aimed at an unnamed organization in the US. Attack, according to the hunting team for Symantec, part Broadcom, debt Cve-2025-29824Lack of escalation of privileges in the driver of the general log file (CLFS). Last month, it was secured by Microsoft. Play. It is actively working at least in mid -2012. In the activity observed Symantec, as they say, the threat subjects that are most likely used by the public adaptive CISCO security device (ASA)…

Read More

07 May 2025Red LakshmananProgram supply chain / malicious software Cybersecurity researchers have discovered a malicious package on Python Package Index (PYPI) storage facilities, which is disguised as a seemingly harmless utilities associated with strife, but includes trojan with remote access. The package in question Discordpydebugwhich was loaded in Pypi on March 21, 2022. It was loaded 11 574 times and continues to remain available In the open source register. Interestingly, the package has not received any updates since then. “At first glance, it seemed – Note. “However, the package hid a fully functional Trojan access (rat).” After installation, the package…

Read More

07 May 2025Red LakshmananVulnerability / spyware software A federal jury on Tuesday decided that NSO Group should pay meta owned by WhatsApp WhatsApp Approximately $ 168 million In monetary losses, more than four months after the federal judge ruled that the Israeli company violated US laws using WhatsApp servers to deploy Pegasus Spyware, focusing on more than 1400 people worldwide. WhatsApp originally submitted lawsuit Against NSO Group in 2019, accusing the latter to use Pegasus for orientation to journalists, human rights defenders and political dissidents. Court documents published as part of the trial disclosed This 456 Mexicans were sent during…

Read More

06 May 2025Red LakshmananInternet things / vulnerability Actors threatened watched as actively used security deficiencies in Geovision End of Life (EOL) Internet things (IOT) to smuggle them into World Botnet for distributed service attacks (DDOS). The activity, first observed by the Akamai Security Intelligence and Response (SIRT) team in early April 2025, provides for the operation of two disadvantagesCve-2024-6047 and Cve-2024-11120CVSS results: 9.8) that can be used to perform arbitrary system teams. “Explohent is oriented – Note In a report that shared with Hacker News. In the attacks identified by the security and infrastructure company, Botnet was found teams to…

Read More

Cybersecurity researchers raised the lids on two threats organized by investment scams through deceived celebrities and hid their activities through traffic distribution systems (TDSs). Activity clusters were called a reckless rabbit and a ruthless rabbit using the Infoblox intelligence firm. The attacks were noted to attract the victims with fictitious platforms, including the exchange of cryptocurrencies, which are then advertised on social media platforms. An important aspect of these scams is the use of web -forms to collect users’ data. “Free Rabbit creates advertising on Facebook, which lead to fake news articles, which presents the approval of celebrities for the…

Read More